Jun 14, 2019
With the rise of edge data centres and an increase in cloud-based computing, companies are facing new challenges in end-to-end cybersecurity. To ensure proper protection, data centre teams must now assess both internal processes and strategies used by cloud suppliers....
Jun 12, 2019
People are the new perimeter and identity is at the very core of maintaining a secure, trusted environment. New technologies and trends, including the mobile workforce, BYOD, IoT, digital transformation, and the consumerisation of IT, are shifting identity and access...
Jun 11, 2019
It’s no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences. Simon McCullough, major channel account manager at F5 Networks However, rapid advances in technology also result in big opportunities for hackers...
Jun 9, 2019
The file scrambler, the data hoarder and the ransom demander – ransomware isn’t fun for anyone … You’ve read our comprehensive guide to cybersecurity threats and you’ve hopefully read our inside guides to Ransomware and Malware but now it is time to delve deep...
Jun 7, 2019
There is growing number of attacks and almost all the successful attacks have come from an insider being compromised through deception, negligence or a lack of awareness. In this era of endless cyberattacks, companies need to attack or face being attacked and stand to...
Jun 7, 2019
Drugs, prostitution, armed robbery, rape and hijackings are just a few of the crimes that plague the downtown streets of cities like Durban, KwaZulu-Natal. By Mark Chertkow, director at Graphic Image Technologies Within walking distance of tourist hotspots like the...